Vulnerabilities on SHAREit Application

  • CERT Admin
  • Thu Feb 28 2019
  • Alerts

Systems Affected 

SHAREit Android application versions below or equal to 4.0.38

Threat Level

High

Overview 

Two high-severity vulnerabilities were found in the SHAREit android application which will allow attackers to bypass authentication mechanism and steal sensitive files from victim's devices.

Description 

SHAREit application is used by over 1.5 billion users and it is a widely used application to share video, music, files and applications on digital devices. SHAREit application is available on Android, iOS, Windows and Mac platforms. Among above users more than 500 million users use SHAREit android application and it was identified that there is an authentication bypass vulnerability and arbitrary file download vulnerability.

SHAREit server uses multiple services via different ports on a device, but researchers have identified two designated services including Command Channel (runs on Port 55183) and Download Channel (runs on port 2999).

Command Channel is a regular TCP channel where application exchange messages with other SHAREit instances running on other devices. Download Channel is the SHAREit application's own HTTP server which mainly enables other devices to download shared files. When SHAREit application send a file to an another device, a regular file transfer session begins with a device identification. Later the sender sends a control message to the receiver indicating that there is a file to be share. Once the receiver verifies that there is no duplication, it goes to Download Channel and fetch the sent file using the information from the control message.

However, researchers discovered that when a user with no valid session tries to fetch a non-existing page the HTTP server accept the request.  Researchers also identified that when a download request is initiated there is no mechanism to check the authenticity of the session. This enables malicious client with a valid session to download any resource by directly referencing its download request.

Impact 

  ✦  Malicious user can get access to your shared files on the device.
  ✦  Malicious user can share suspicious files which may include virus and malware.
  ✦  Disruption to regular operations.

Solution/ Workarounds 

  ✻  Update the latest version of the Mozilla's Firefox on Windows, Linux and Mac.

References 

https://thehackernews.com/2019/02/shareit-android-hacking.html?utm_source=feedburner&utm_medium=feed& utm_campaign=Feed%3A+TheHackersNews+%28The+Hackers+News+-+Cyber+Security+Blog%29& _m=3n.009a.1937.pg0ao0dyh2.171v
https://www.cyberintelligence.in/vulnerabilities-in-shareit-application/

Disclaimer 

The information provided herein is on "as is" basis, without warranty of any kind. 

Last updated: Thu Feb 28 2019